Attribute-based encryption scheme supporting attribute revocation in cloud storage environment

Attribute-based encryption (ABE) scheme is widely used in the cloud storage due to its fine-grained access control.Each attribute in ABE may be shared by multiple users at the same time.Therefore,how to achieve attribute-level user revocation is currently facing an important challenge.Through resear...

Full description

Saved in:
Bibliographic Details
Main Authors: Lei SUN, Zhiyuan ZHAO, Jianhua WANG, Zhiqiang ZHU
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2019-05-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2019116/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539343307505664
author Lei SUN
Zhiyuan ZHAO
Jianhua WANG
Zhiqiang ZHU
author_facet Lei SUN
Zhiyuan ZHAO
Jianhua WANG
Zhiqiang ZHU
author_sort Lei SUN
collection DOAJ
description Attribute-based encryption (ABE) scheme is widely used in the cloud storage due to its fine-grained access control.Each attribute in ABE may be shared by multiple users at the same time.Therefore,how to achieve attribute-level user revocation is currently facing an important challenge.Through research,it has been found that some attribute-level user revocation schemes currently can’t resist the collusion attack between the revoked user and the existing user.To solve this problem,an attribute-based encryption scheme that supported the immediate attribute revocation was proposed.The scheme could achieve attribute-level user revocation and could effectively resist collusion attacks between the revoked users and the existing users.At the same time,this scheme outsourced complex decryption calculations to cloud service providers with powerful computing ability,which reduced the computational burden of the data user.The scheme was proved secure based on computational Diffie-Hellman assumption in the standard model.Finally,the functionality and efficiency of the proposed scheme were analyzed and verified.The experimental results show that the proposed scheme can safely implement attribute-level user revocation and has the ability to quickly decrypt,which greatly improves the system efficiency.
format Article
id doaj-art-49232ffae23a4b1eaf7c6d3f6339d83f
institution Kabale University
issn 1000-436X
language zho
publishDate 2019-05-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-49232ffae23a4b1eaf7c6d3f6339d83f2025-01-14T07:16:53ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2019-05-0140475659726935Attribute-based encryption scheme supporting attribute revocation in cloud storage environmentLei SUNZhiyuan ZHAOJianhua WANGZhiqiang ZHUAttribute-based encryption (ABE) scheme is widely used in the cloud storage due to its fine-grained access control.Each attribute in ABE may be shared by multiple users at the same time.Therefore,how to achieve attribute-level user revocation is currently facing an important challenge.Through research,it has been found that some attribute-level user revocation schemes currently can’t resist the collusion attack between the revoked user and the existing user.To solve this problem,an attribute-based encryption scheme that supported the immediate attribute revocation was proposed.The scheme could achieve attribute-level user revocation and could effectively resist collusion attacks between the revoked users and the existing users.At the same time,this scheme outsourced complex decryption calculations to cloud service providers with powerful computing ability,which reduced the computational burden of the data user.The scheme was proved secure based on computational Diffie-Hellman assumption in the standard model.Finally,the functionality and efficiency of the proposed scheme were analyzed and verified.The experimental results show that the proposed scheme can safely implement attribute-level user revocation and has the ability to quickly decrypt,which greatly improves the system efficiency.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2019116/cloud storageattribute-based encryptioncollusion attackattribute revocationoutsourced decryption
spellingShingle Lei SUN
Zhiyuan ZHAO
Jianhua WANG
Zhiqiang ZHU
Attribute-based encryption scheme supporting attribute revocation in cloud storage environment
Tongxin xuebao
cloud storage
attribute-based encryption
collusion attack
attribute revocation
outsourced decryption
title Attribute-based encryption scheme supporting attribute revocation in cloud storage environment
title_full Attribute-based encryption scheme supporting attribute revocation in cloud storage environment
title_fullStr Attribute-based encryption scheme supporting attribute revocation in cloud storage environment
title_full_unstemmed Attribute-based encryption scheme supporting attribute revocation in cloud storage environment
title_short Attribute-based encryption scheme supporting attribute revocation in cloud storage environment
title_sort attribute based encryption scheme supporting attribute revocation in cloud storage environment
topic cloud storage
attribute-based encryption
collusion attack
attribute revocation
outsourced decryption
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2019116/
work_keys_str_mv AT leisun attributebasedencryptionschemesupportingattributerevocationincloudstorageenvironment
AT zhiyuanzhao attributebasedencryptionschemesupportingattributerevocationincloudstorageenvironment
AT jianhuawang attributebasedencryptionschemesupportingattributerevocationincloudstorageenvironment
AT zhiqiangzhu attributebasedencryptionschemesupportingattributerevocationincloudstorageenvironment